Security and Information Technology Governance
Who should attend?
This training course is suitable for a wide range of professionals but will greatly benefit individuals responsible for Risk Management, IT Security and IT Security Auditing, Technical IT Management and those with the involvement in systems integration and corporate IT development. Financial controllers with a technical interest may also benefit from the seminar.
Duration
5 Days
Programme Overview
Information is the lifeblood to all organizations, without it, it would be severely impacted and ultimately cease to function. Information is knowledge and knowledge is power. With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes an increasingly critical evolutionary task.
Information is at risk from many sources, legal, electronic, physical, internal and external to mention a few. It is paramount that security and related management personnel have an understanding of the risks, controls, and countermeasures that are available to secure information and technology within an effective management framework. Furthermore utilizing countermeasures, best practice, and management techniques will mitigate electronic and physical risks and enhance protection to an organization.
Objectives
By the end of this training course, participants will be able to:
- Gain knowledge of the concepts relating to information security management (confidentiality, integrity, availability, vulnerability, threats, risks, countermeasures, etc)
- Understand the current legislation and regulations which impact upon information security management
- Be fully aware of current national and international standards such as ISO 27002, frameworks and organizations which facilitate the management of information security
- Understand the current business and common technical environments in which information security management has to operate
- Gain knowledge of the categorization, operation, and effectiveness of controls of different types and characteristics
Methodology
Participants will gain detailed knowledge by active participation in seminars, group discussions, and real-life case studies.
Delivery will be by presentation, group syndicate investigations, training DVD and interactive seminars.
Course Outline
Day One: Information Security Management - An Overview
- IT Risk Management
- Categorising Physical and Electronic Risk
- IT and Networks
- Computer Systems Design
- Legal and Regulatory Considerations
- Information, Business and Risk – Case Study
Day Two: Information Security Management
- Ensuring Information Security
- Confidentiality
- Integrity
- Availability
- Authenticity
- Non-Repudiation of Data
- Ethical hacking and Industrial Espionage
- Where to design and place effective computer and management controls
- Case Study
Day Three: Information Management – International Standards
- Code of Practice for Information Security Management – ISO 17799 / ISO27002
- Best Practice and Implementing Guidance and Controls For ISO27002
- Information Security Management Overview
- Risk Assessment and Controls
- Security Policy Documentation
- Organising Information Security Management
- IT Asset Management
- Personnel and Human Resources
Day Four: Information Management ISO27002
- Best Practice and Implementing Guidance and Controls For ISO27002
- Physical and Environmental Security
- Operations Management and Communications
- Access Control
- Information Systems (Design, Development, Maintenance)
- Incident Management
- Business Continuity
- Regulatory Compliance
- Best Practice and Implementation Guidance for BS ISO/IEC 38500:2008 – IT Management
- Case Study
Day Five: Implementing Effective Information Security Management Frameworks
- Successful steps for IT Security Management
- Audit and Compliance for IT Resources
- Business Process Engineering
- Case Study